ThreatMetrix Blog

Target, Adobe, Neiman Marcus and countless other companies had tens of millions of records ripped off. But what ultimately happens to the data hackers steal? Of course they might use it themselves. But hacking often requires a different skill set from, say, identity theft. The other possibility is selling the data to other criminals who do have the right skill set.

Or they could sell it online to other cybercriminals. In a place Rebecca Stopoli on yahoo.com describes as the “deep web,” cybercriminals maintain bizarre bazaars where a buyer can get anything from drugs, weapons and hit men to use the weapons to stolen data. All they need is money and a browser like Tor to hide their identities.

Stopoli talks about Yahoo Finance’s voyage into the deep web for a virtual “shopping trip to browse what was available for purchase at this vast illicit Internet mall [where] sales here can come and go very quickly, and items are often priced by the level of difficulty attached to obtaining them.”

Subscribe

Share

Tags

From The Blog

The ThreatMetrix Global Trust Intelligence Network’s Expansion Means More Businesses Stopping Fraud in Real Time without Customer Friction ThreatMetrix’s Global Trust Intelligence Network (The Network) enables businesses to seamlessly differentiate between trusted consumers and potential cybercriminals. This prevents hundreds of millions of dollars in fraud losses globally, without impacting the customer experience for legitimate users. 15 billion transactions analyzed by end of 2015 Using The Network, ThreatMetrix® expects to analyze more than 15 billion total transactions by the end of this year. This volume is…

Real-Time Web Fraud Map

See Real-time Cybercrime Prevention.
The ThreatMetrix™ Web Fraud Map shows you cyberthreats as they happen.